Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Openclaw Action
v1.0.0GitHub Action for automated security scanning of agent workspaces. Detects exposed secrets, prompt/shell injection, and data exfiltration patterns in PRs and commits.
⭐ 0· 691·2 current·2 all-time
by@atlaspa
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Name/description match the code: it is a GitHub Action that scans workspaces for secrets, injection, and egress patterns and only requires python3. However the README and SKILL.md assert 'No network calls' and 'No dependencies' while action.yml downloads scanner scripts at runtime via curl from raw.githubusercontent.com. Fetching remote scanner code is not necessary to describe the action's purpose and is inconsistent with the claimed 'auditable, local-only' trust model.
Instruction Scope
SKILL.md and README instruct how to add the Action and state scanners run locally and are auditable. The actual runtime instructions (action.yml + scripts/scan.py) download external Python scanner scripts and then execute them. That means the action's runtime behavior extends beyond the local repo content the README promises: it executes code retrieved over the network, which can change between runs and may alter scanning behavior or exfiltrate data.
Install Mechanism
There is no installer, but action.yml explicitly uses curl to download three scripts from raw.githubusercontent.com at runtime. raw.githubusercontent.com is a well-known host (GitHub), which is better than arbitrary servers, but downloading and executing raw scripts from the network on each run is higher-risk than vendoring/pinning code. The downloads are not pinned to commit SHAs or releases (they use main branch URLs), increasing supply-chain fragility.
Credentials
The skill does not request extra credentials or unrelated environment variables. It uses standard GitHub Actions runner env vars (GITHUB_OUTPUT, GITHUB_STEP_SUMMARY) and accepts workspace and scan toggles via inputs. No SECRET/TOKEN env vars are required by the skill itself.
Persistence & Privilege
always is false; the skill does not request permanent agent presence or attempt to modify other skills. It writes only Action outputs and a job summary, and does not persist data beyond the run. The main privilege concern is runtime execution of downloaded code, not persistent elevated privileges.
What to consider before installing
This action performs the advertised scans, but it contradicts its own trust claims: instead of running only local, auditable code, action.yml downloads and executes scanner scripts from GitHub at runtime (raw URLs on the main branches). That creates a supply-chain risk because those remote files can change or be compromised.
Before installing or using this Action, consider:
- Prefer vendored or pinned scanner code: vendor the scanner scripts into the action repository or fetch scripts pinned to a specific commit SHA or release tag instead of raw 'main' URLs.
- Review the exact remote files to be executed (the three raw.githubusercontent.com URLs) and verify the upstream maintainers and commit SHAs. If you cannot verify, do not allow the action to run with elevated access.
- Treat this action as having the ability to execute arbitrary Python fetched at runtime: ensure it runs with least privilege in your CI, and avoid exposing secrets to runs triggered by untrusted forks or contributors.
- If you need stronger assurance, replace the runtime curl step with code checked into your organization (or use a verified marketplace action), or require that the scanner code is included in the repo under review so behavior is fully auditable.
If you accept the current design, at minimum ask the publisher to pin downloads to immutables (commit SHAs/releases) and update the README to remove the false 'No network calls' claim. If you cannot confirm the upstream repositories are trustworthy, treat the action as risky and avoid installing it.Like a lobster shell, security has layers — review code before you run it.
latestvk973gwg3rwk29k9jt47tx8batx810xcm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛡️ Clawdis
OSmacOS · Linux · Windows
Binspython3
